Security+ PKI Quiz

Security+ PKI Quiz

University

16 Qs

quiz-placeholder

Similar activities

Cybersecurity Essentials Chapter 5 Review

Cybersecurity Essentials Chapter 5 Review

9th Grade - University

20 Qs

Revision for Chapter 5

Revision for Chapter 5

University

16 Qs

Unit 10 Cybersecurity CSP

Unit 10 Cybersecurity CSP

12th Grade - University

13 Qs

Unit Test COMP1711

Unit Test COMP1711

University

20 Qs

H466 - 1.3.1 - Understanding Encryption Methods

H466 - 1.3.1 - Understanding Encryption Methods

12th Grade - University

15 Qs

KMA PKI - Intro

KMA PKI - Intro

University

13 Qs

Digital Signeture

Digital Signeture

University

13 Qs

Cryptography 4E(Third Quiz)

Cryptography 4E(Third Quiz)

University

15 Qs

Security+ PKI Quiz

Security+ PKI Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Kyle Atkins

Used 28+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following answers refers to a hierarchical system for the creation, management, storage, distribution, and revocation of digital certificates?

Web of Trust

PKI

IaaS

CA

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of trusted third party that issues digital certificates used for creating digital signatures and public-private key pairs is known as:

IKE

CA

PKI

CSP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following certificate formats is used to store a binary representation of a digital certificate?

PFX

DER

P7B

PEM

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A digital certificate which allows multiple domains to be protected by a single certificate is known as:

Extended Validation (EV) certificate

Wildcard certificate

Subject Alternative Name (SAN) certificate

Root signing certificate

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which digital signature type allows multiple subdomains to be protected by a single certificate

Root signing certificate

Subject Alternative Name (SAN) certificate

Extended Validation (EV) certificate

Wildcard certificate

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

"Certificate chaining" refers to a process of verifying the authenticity of a newly received digital certificate. The process involves checking all of the certificates in the chain of certificates from a trusted root CA, through any intermediate CAs, down to the certificate issued to the end user. A new certificate can only be trusted if each certificate in that certificate's chain is properly issued and valid.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Copies of lost private encryption keys can be retrieved from a key escrow by recovery agents. A recovery agent is an individual with access to key database and permission level allowing him/her to extract keys from escrow.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?